What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhe Xia
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2023
journals/istr
Simple and efficient threshold changeable secret sharing.
Lein Harn
Chingfang Hsu
Zhe Xia
Hang Xu
Shuchang Zeng
Fengling Pang
2023
journals/tifs
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
Hua Shen
Ge Wu
Zhe Xia
Willy Susilo
Mingwu Zhang
2023
conf/blocktea
Blockchain-Based Hierarchical Access Control with Efficient Revocation in mHealth System.
Ting Liang
Yaorui He
Pei Huang
Zhe Xia
2023
conf/blocktea
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain.
Yaorui He
Ting Liang
Pei Huang
Zhe Xia
2022
journals/istr
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control.
Wenzheng Zhang
Shiyun Liu
Zhe Xia
2021
journals/istr
Design of ideal secret sharing based on new results on representable quadripartite matroids.
Chingfang Hsu
Lein Harn
Zhe Xia
Maoyuan Zhang
Quanrun Li
2020
conf/acisp
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing.
Zhe Xia
Bo Yang
Yanwei Zhou
Mingwu Zhang
Yi Mu
2019
conf/ccs
EAPA: Efficient Attestation Resilient to Physical Attacks for IoT Devices.
Wenwen Yan
Anmin Fu
Yi Mu
Zhe Xia
Shui Yu
Boyu Kuang
2019
conf/provsec
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Zhe Xia
Bo Yang
Yanwei Zhou
Mingwu Zhang
Hua Shen
Yi Mu
2019
conf/icics
Provably Secure Group Authentication in the Asynchronous Communication Model.
Zhe Xia
Lein Harn
Bo Yang
Mingwu Zhang
Yi Mu
Willy Susilo
Weizhi Meng
2018
conf/acisp
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Zhe Xia
Liuying Sun
Bo Yang
Yanwei Zhou
Mingwu Zhang
2017
journals/istr
Special issue on Secure Computation on Encrypted Data.
Jiageng Chen
Debiao He
Chunhua Su
Zhe Xia
2016
journals/istr
Editorial: Special issue on security and dependability of internet of things.
Ning Wang
Zhe Xia
Jianwen Xiang
2016
conf/acisp
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry.
Zhe Xia
Xiaoyun Yang
Min Xiao
Debiao He
2013
conf/uss
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Morgan Llewellyn
Steve A. Schneider
Zhe Xia
Chris Culnane
James Heather
Peter Y. A. Ryan
Sriramkrishnan Srinivasan
2012
conf/uss
Using Prêt à Voter in Victoria State Elections.
Craig Burton
Chris Culnane
James Heather
Thea Peacock
Peter Y. A. Ryan
Steve A. Schneider
Vanessa Teague
Roland Wen
Zhe Xia
Sriramkrishnan Srinivasan
2011
conf/uss
Authentication Codes.
Chris Culnane
David Bismark
James Heather
Steve A. Schneider
Sriramkrishnan Srinivasan
Zhe Xia
2009
journals/tifs
Prêt à voter: a voter-verifiable voting system.
Peter Y. A. Ryan
David Bismark
James Heather
Steve A. Schneider
Zhe Xia
2008
conf/uss
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption.
Zhe Xia
Steve A. Schneider
James Heather
Jacques Traoré
Coauthors
Anmin Fu
(1)
Bo Yang
(4)
Boyu Kuang
(1)
Chingfang Hsu
(2)
Chris Culnane
(3)
Chunhua Su
(1)
Craig Burton
(1)
David Bismark
(2)
Debiao He
(2)
Fengling Pang
(1)
Ge Wu
(1)
Hang Xu
(1)
Hua Shen
(2)
Jacques Traoré
(1)
James Heather
(5)
Jiageng Chen
(1)
Jianwen Xiang
(1)
Lein Harn
(3)
Liuying Sun
(1)
Maoyuan Zhang
(1)
Min Xiao
(1)
Mingwu Zhang
(5)
Morgan Llewellyn
(1)
Ning Wang
(1)
Pei Huang
(2)
Peter Y. A. Ryan
(3)
Quanrun Li
(1)
Roland Wen
(1)
Shiyun Liu
(1)
Shuchang Zeng
(1)
Shui Yu
(1)
Sriramkrishnan Srinivasan
(3)
Steve A. Schneider
(5)
Thea Peacock
(1)
Ting Liang
(2)
Vanessa Teague
(1)
Weizhi Meng
(1)
Wenwen Yan
(1)
Wenzheng Zhang
(1)
Willy Susilo
(2)
Xiaoyun Yang
(1)
Yanwei Zhou
(3)
Yaorui He
(2)
Yi Mu
(4)
Zhe Xia
(19)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to